<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reverse engineering and Hardware security</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/25994/reverse-engineering-and-hardware-security</link><description>Hi Nordic Semiconductor, I am Yoganathan Sivakumar studying Master in System on chip in LUND University. I wanted to ask some technical question in industry oriented. I wanted to know companies are doing Reverse Engineering in IC? Do Nordic Semiconductor</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 17 Oct 2017 14:37:46 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/25994/reverse-engineering-and-hardware-security" /><item><title>RE: Reverse engineering and Hardware security</title><link>https://devzone.nordicsemi.com/thread/102425?ContentTypeID=1</link><pubDate>Tue, 17 Oct 2017 14:37:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c050a989-45cf-478f-abb9-1031d4de8254</guid><dc:creator>Sigurd</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;For protecting the software on the chip, we have something called readback protection on our nRF52-series chips. This prevents users from using a debugger to read the flash and RAM. Setting APPROTECT &amp;quot;disconnects&amp;quot; the ability to connect with a programmer/debugger, but it still allows the microcontroller to access its own flash and RAM area. See this &lt;a href="http://infocenter.nordicsemi.com/topic/com.nordic.infocenter.whitepapers/dita/whitepapers/nwp_027/nWP_027_approtect.html?cp=11_0_3"&gt;whitepaper&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The only way to &amp;#39;reopen/unlock&amp;#39; the device after APPROTECT is set, is to issue an ERASEALL command through the CTRL-AP access port, and then issue a reset through the CTRL-AP. (nrfjprog --recover). This will erase the entire code flash and UICR area of the device, in addition to the entire RAM.&lt;/p&gt;
&lt;p&gt;Note that our nRF51 and nRF52 series are much more complex than the old legacy products(e.g. &lt;a href="https://hackaday.com/2015/02/23/nordic-nrf24l01-real-vs-fake/"&gt;nRF24L01+&lt;/a&gt;), and it’s extremely difficult and close to impossible to make a counterfeit nRF5x chip.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>